<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring :NAT/PAT and IP inspect  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-nat-pat-and-ip-inspect/m-p/1265260#M859007</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IP inspect uses CBAC which works the same way as SPI function on a regular firewall.  There are 3 steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. configure NAT/PAT (which you have done)&lt;/P&gt;&lt;P&gt;2. Allow the required traffic outbound (ACL)&lt;/P&gt;&lt;P&gt;3. Create the IP inspect rules and apply them to the interface.  The IP inspect rules should contain the traffic that should be permitted back in (replies to outbound requests) even though the ACL denies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Creating INSPECT ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC ftp   &lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC http   &lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Applying to interface **&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the interface you wish to permit the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect MYTRAFFIC out    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Jul 2009 14:30:49 GMT</pubDate>
    <dc:creator>networker99</dc:creator>
    <dc:date>2009-07-01T14:30:49Z</dc:date>
    <item>
      <title>Configuring :NAT/PAT and IP inspect</title>
      <link>https://community.cisco.com/t5/network-security/configuring-nat-pat-and-ip-inspect/m-p/1265259#M859006</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have configured 1800 ISR to access internet using and NAT ( actually PAT ) and overload feature.&lt;/P&gt;&lt;P&gt;SImple mode fa0/0 is inside interface and fa0/1 is outside interface. &lt;/P&gt;&lt;P&gt;We need to apply ip inspect and enable IOS firewall as a security feature.&lt;/P&gt;&lt;P&gt;How do we apply IP  inspect rules for the traffic that is being NATed or we need just to apply it.&lt;/P&gt;&lt;P&gt;Please share experience of configuring ip inspection with NAT/PAT.&lt;/P&gt;&lt;P&gt;any configuration link on cisco.com?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Subodh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-nat-pat-and-ip-inspect/m-p/1265259#M859006</guid>
      <dc:creator>bapatsubodh</dc:creator>
      <dc:date>2019-03-11T15:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring :NAT/PAT and IP inspect</title>
      <link>https://community.cisco.com/t5/network-security/configuring-nat-pat-and-ip-inspect/m-p/1265260#M859007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IP inspect uses CBAC which works the same way as SPI function on a regular firewall.  There are 3 steps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. configure NAT/PAT (which you have done)&lt;/P&gt;&lt;P&gt;2. Allow the required traffic outbound (ACL)&lt;/P&gt;&lt;P&gt;3. Create the IP inspect rules and apply them to the interface.  The IP inspect rules should contain the traffic that should be permitted back in (replies to outbound requests) even though the ACL denies&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Creating INSPECT ***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC ftp   &lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC http   &lt;/P&gt;&lt;P&gt;ip inspect name MYTRAFFIC https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** Applying to interface **&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the interface you wish to permit the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect MYTRAFFIC out    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jul 2009 14:30:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-nat-pat-and-ip-inspect/m-p/1265260#M859007</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2009-07-01T14:30:49Z</dc:date>
    </item>
  </channel>
</rss>

